IACR News item: 30 May 2014
Marko Carić
ePrint Report
The modification of message that meets the sufficient conditions for
collision is found in the last step of differential attack proposed
by Wang et all. (2005) on MD4 hash algorithm. Here we show how this
attack phase, finding a collision starting from the list of
sufficient conditions for the collision, can be implemented using a
combination of two algorithms - evolutionary algorithm and hill
climbing. Hybridization of evolutionary algorithm and hill climbing
is a well-known technique for improving solutions, but it isn\'t
applied to this domain (at least by information that author has
collected).
Additional news items may be found on the IACR news page.